The malicious payload that the exploit delivers is the same in both cases. Specifically, a memory corruption vulnerability allows execution of the malicious code on computers running Windows.

Considering that the exploit code is now public knowledge, new variants of this attack are likely to show up. As a result, there is a high probability the code will be repurposed to infect workstations with malware or ransomware.

A representative of Mozilla told Ars Technica they were aware of the vulnerability and are working on a fix. Firefox users should at the very least disable JavaScript on as many sites as possible if they are currently unable to switch to a secure browser.

We will keep you posted on further development regarding this incident.

Sead is a former Al Jazeera journalist who shares his passion for technology on various tech media outlets. Formerly a heavy gamer (semi-professional Warcraft 3 gosu), he now enjoys reviewing software and churning out words about the latest tech-news. He holds a college degree in Journalism and likes to annoy his neighbors by playing one of his three electric and two acoustic guitars.